- Hacking -

Last update 09.10.2017 13:52:27

Introduction  List  Kategorie  Subcategory 0  1  2  3  4  5  6  7  8  Hacker techniques



Date

Name

Category

Web

18.8.19

Decade-Long Bank Account Hacking Scheme Gets Fraudster 57 Months Hacking

Bleepingcomputer

17.8.19

Iowa Grocery Chain Investigating Possible Hack of Payment Processing Systems

Hacking

Securityweek
16.8.19 European Central Bank Shuts Down 'BIRD Portal' After Getting Hacked BigBrothers  Hacking Thehackernews
16.8.19

Clickjacking Evolves to Hook Millions of Top-Site Visitors

Hacking

Threatpost

15.8.19 HVACking: Remotely Exploiting Bugs in Building Control Systems Hacking

Bleepingcomputer

13.8.19 Epic Games Hit With Class Action Lawsuit Over Hacked 'Fortnite' Accounts Hacking Thehackernews
12.8.19 Database from StockX Hack Sold Online, Check If You're Included Hacking

Bleepingcomputer

9.8.19

Hidden Injection Flaws Found in BIG-IP Load Balancers Hacking

Securityweek

7.8.19

SQL Injection Vulnerability Exposed Starbucks Financial Records Hacking  Vulnerebility

Securityweek

7.8.19

Russian Hackers Leverage IoT Devices to Access Corporate Networks

Hacking  IoT

Securityweek

6.8.19

StockX Hack Exposes Personal Information of Customers Hacking  Incindent

Bleepingcomputer

5.8.19

ID Theft Stings, But it's Hard to Pin on Specific Data Hacks Hacking Securityweek

5.8.19

Hacking Radio Blasting Systems for Fun & Explosions Hacking

Securityaffairs

3.8.19

Researchers Discover New Ways to Hack WPA3 Protected WiFi Passwords Hacking Thehackernews

1.8.19

Alleged Capital One Hacker Barely Bothered to Hide Hacking Securityweek

31.7.19

Hacking avionics systems through the CAN bus

Hacking

Securityaffairs

31.7.19

Researchers Hack Surveillance Systems to Show Fake Video Feed Hacking

Bleepingcomputer

31.7.19

Hacking eCommerce sites based on OXID eShop by chaining 2 flaws Hacking  Vulnerebility

Securityaffairs

31.7.19

Hacking campaign is wiping Iomega NAS Devices exposed online Hacking

Securityaffairs

28.7.19

Hackers Inject Multi-Gateway Card Skimmer via Fake Google Domains

Hacking

Bleepingcomputer

27.7.19

Rare Steganography Hack Can Compromise Fully Patched Websites

Hacking  Vulnerebility

Threatpost

24.7.19

Siemens Contractor Pleads Guilty to Planting 'Logic Bomb' in Spreadsheets Hacking Thehackernews

24.7.19

Popular Samsung, LG Android Phones Open to ‘Spearphone’ Eavesdropping

Hacking

Threatpost

24.7.19

A new ProFTPD vulnerability exposes servers to hack Hacking  Vulnerebility Securityaffairs

24.7.19

Hackers Compromise 62 Colleges via Campus ERP Platform Hacking  Incindent Securityweek

22.7.19

Hackers published a list of allegedly phished Discord login credentials Hacking Securityaffairs

21.7.19

Hackers breach 62 US colleges by allegedly exploiting Ellucian Banner Web flaw Hacking  Incindent Securityaffairs

19.7.19

Nation-Backed Hackers Targeted 10,000 Microsoft Customers Hacking Bleepingcomputer

17.7.19

Sprint Accounts Breached by Hackers Using Samsung Site Hacking

Bleepingcomputer

17.7.19

Bulgarian IT Specialist Held Over Taxpayer Data Hack

Hacking  Incindent

Securityweek

17.7.19

SWEED Hackers Target Manufacturing, Logistics Organizations

Hacking

Securityweek

17.7.19

Hackers Access Sprint Accounts via Samsung Website

Hacking

Securityweek

16.7.19

Old Software Makes New Electoral Systems Ripe for Hacking Hacking

Securityweek

16.7.19

The npm installer for PureScript package has been compromised

Hacking

Securityaffairs

16.7.19

Researcher Bypasses Instagram 2FA to Hack Any Account

Hacking  Social

Threatpost

13.7.19

Hacked Hair Straighteners Can Threaten Homes

Hacking

Threatpost

12.7.19

Archive Server of Pale Moon Open Source Browser Hacked Hacking Securityweek

11.7.19

Bad McAfee Exploit Prevention Update Blocked Windows Logins Exploit  Hacking

Bleepingcomputer

10.7.19

Sea Turtle's DNS Hijacking Continues Despite Exposure Hacking Securityweek

8.7.19

Hackers compromised a Canonical GitHub account, Ubuntu source code was not impacted Hacking Securityaffairs

8.7.19

Canonical GitHub Account Hijacked Hacking

Securityweek

8.7.19

Ubuntu-Maker Canonical’s GitHub Account Gets Hacked Hacking Thehackernews
4.7.19 Multiple Chinese Groups Share the Same RTF Weaponizer Hacking Securityweek
4.7.19 17-Year-Old Weakness in Firefox Let HTML File Steal Other Files From Device Hacking Thehackernews

2.7.19

Illegal Card Enrollment Services Hijack Online Bank Accounts Hacking Bleepingcomputer

28.6.19

Industry Reactions to Nation-State Hacking of Global Telcos

Hacking

Securityweek

27.6.19

2nd Florida City Pays Hackers, as 3rd City Faces Breach Hacking Securityweek

27.6.19

Flaws in EA Games Login exposed accounts of 300 Million Gamers to hack Hacking Securityaffairs

27.6.19

EA Games Login Flaw Exposed Accounts of 300 Million Gamers Hacking Securityweek

26.6.19

Social Engineering Forum Hacked, Data Shared on Leak Sites Hacking

Bleepingcomputer

25.6.19

Anonymous Belgium hacker identified after dropping USB drive while throwing Molotov cocktail Hacking Securityaffairs

24.6.19

NASA hacked! An unauthorized Raspberry Pi connected to its network was the entry point Hacking

Securityaffairs

23.6.19

Report: Jet Propulsion Laboratory Hacked for 10 Months Hacking Securityweek
22.6.19 Beware! Playing Untrusted Videos On VLC Player Could Hack Your Computer Hacking Thehackernews
18.6.19 Florida Effort to Block Election Hacking Gets Extra $2M Hacking

Securityweek

17.6.19

Bella Thorne Tweets Her Nude Photos After Threats From Hacker

Hacking

Bleepingcomputer

17.6.19

Hacker is targeting DNA sequencer applications from Iranian IP address

Hacking

Securityaffairs

16.6.19

XSS flaw would have allowed hackers access to Google’s network and impersonate its employees

Hacking

Securityaffairs

14.6.19

Yubico is replacing for free YubiKey FIPS devices due to security weakness

Hacking

Securityaffairs

12.6.19

Radiohead Defies Hackers, Releases Trove of Stolen Music Hacking

Securityweek

12.6.19

Radiohead releases a trove of stolen music in response to the hack

Hacking

Securityaffairs

11.6.19

Your Linux Can Get Hacked Just by Opening a File in Vim or Neovim Editor

Hacking

Thehackernews

11.6.19

Customs Says Hack Exposed Traveler, License Plate Images

Hacking

Securityweek

6.6.19

Streaming Video Fans Open to TV Hijacking

Hacking

Threatpost

5.6.19

New Email Hacking Tool from OilRig APT Group Leaked Online

Hacking

Bleepingcomputer

5.6.19

Hackers Can Bypass Windows Lockscreen on Remote Desktop Sessions

Hacking

Securityweek

4.6.19

OilRig’s Jason email hacking tool leaked online

Hacking

Securityaffairs

4.6.19

Hack The Sea: Bridging the gap between hackers and the maritime sector

Hacking

Net-security

3.6.19

Gaining Root Access to Host through rkt Container hack

Hacking

Securityaffairs

3.6.19

Expert shows how to Hack a Supra Smart Cloud TV

Hacking

Securityaffairs

31.5.19

New Zealand Says Budget Leak Was Bungled, Not Hacked

Hacking

Securityweek

29.5.19

DuckDuckGo Address Bar Spoofing

Hacking

Securityaffairs

28.5.19

BlueKeep scans observed from exclusively Tor exit nodes

Hacking

Securityaffairs

28.5.19

Crooks leverages .htaccess injector on Joomla and WordPress sites for malicious redirects

Hacking

Securityaffairs

26.5.19

BestMixer.io Service Shut Down For Laundering $200 Million+

Hacking

Bleepingcomputer

26.5.19

Zebrocy Operators Also Look for Browser and Email Databases

Hacking

Bleepingcomputer

26.5.19

Do You Remember the SUBST Command?

Hacking

SANS

25.5.19

How Hackers Access Direct Deposit Paycheck — And What to Do About It

Hacking

Securityaffairs

24.5.19

Anonymous and LulzSec target the Italian Police and doctors

Hacking

Securityaffairs

24.5.19

Playing Cat and Mouse: Three Techniques Abused to Avoid Detection

Hacking

Securityaffairs

20.5.19

TeamViewer Confirms It Was Hacked in 2016

Hacking

Securityweek

20.5.19

Hacktivist Attacks Declined 95 Percent Since 2015: IBM

Hacking

Securityweek

20.5.19

Slack Flaw Allows Hackers to Steal, Manipulate Downloads

Hacking

Securityweek

19.5.19

Number of hacktivist attacks declined by 95 percent since 2015

Hacking

Securityaffairs

18.5.19

Hackers Accessed Stack Overflow's Production Systems

Hacking

Bleepingcomputer

17.5.19

Forbes Becomes Latest Victim of Magecart Payment Card Skimmer

Hacking

Threatpost

16.5.19

Attackers Evade Detection By Randomizing TLS Handshake Ciphers

Hacking

Bleepingcomputer

16.5.19

Google Payment Privacy Settings Hidden Behind Special URL

Hacking

Bleepingcomputer

16.5.19

Hackers Inject Magecart Card Skimmer in Forbes’ Subscription Site

Hacking

Bleepingcomputer

16.5.19

The stealthy email stealer in the TA505 hacker group’s arsenal

Hacking

Securityaffairs

16.5.19

Magecart hackers inject card Skimmer in Forbes Subscription Site

Hacking

Securityaffairs

14.5.19

Fxmsp Chat Logs Reveal the Hacked Antivirus Vendors, AVs Respond

Hacking

Bleepingcomputer

14.5.19

New Details Emerge of Fxmsp's Hacking of Antivirus Companies

Hacking

Bleepingcomputer

14.5.19

ScarCruft continues to evolve, introduces Bluetooth harvester

Hacking

Securelist

14.5.19

The lurking danger of hacked email reply chains

Hacking

Net-security

12.5.19

Hacking the ‘Unhackable’ eyeDisk USB stick

Hacking

Securityaffairs

10.5.19

Top-Tier Russian Hacking group Fxmsp claims hack of major AntiVirus Companies

Hacking

Securityaffairs

10.5.19

Russian Hackers Claim Breach of Three U.S. Anti-Virus Companies

Hacking

Securityweek

10.5.19

Hackers Selling Access and Source Code From Antivirus Companies

Hacking

Bleepingcomputer

10.5.19

DSSuite - A Docker Container with Didier's Tools

Hacking

SANS

9.5.19

Cisco Talos warns of hardcoded credentials in Alpine Linux Docker Images

Hacking

Securityaffairs

9.5.19

Hard-Coded Credentials Found in Alpine Linux Docker Images

Hacking

Securityweek

8.5.19

Hackers Steal $41 Million worth of Bitcoin from Binance Exchange

Hacking

Securityaffairs

8.5.19

Binance Hacked — Hackers Stole Over $40 Million Worth Of Bitcoin

Hacking

Thehackernews

7.5.19

Chinese Hackers Used NSA Hacking Tools Before Shadow Brokers Leaked Them

Hacking

Thehackernews

6.5.19

Flaw in pre-installed software opens Dell computers to remote hijack

Hacking

Net-security

6.5.19

Alleged Ukrainian Malvertiser Extradited, Faces Hacking Charges

Hacking

Bleepingcomputer

2.5.19

Citrix Confirms Hackers Stole Sensitive Employee Personal Information

Hacking

Bleepingcomputer

2.5.19

Cartoon Network Hacked Worldwide to Show Brazilian Stripper Videos

Hacking

Threatpost

2.5.19

Citrix confirmed hackers had access to its network for five months

Hacking

Securityaffairs

2.5.19

Hackers Had Access to Citrix Network for Five Months

Hacking

Securityweek

1.5.19

Researchers Compromise Netflix Content in Widevine DRM Hack

Hacking

Threatpost

30.4.19

Crooks Build Fake Hack Tools and Game Cheats for Profit

Hacking

Bleepingcomputer

30.4.19

Hacking our way into cybersecurity for medical devices

Hacking

Net-security

20.4.19

Broadcom WiFi Driver bugs expose devices to hack

Hacking

Securityaffairs

18.4.19

State-Sponsored DNS Hijacking Infiltrates 40 Firms Globally

Hacking

Threatpost

18.4.19

Code execution – Evernote

Hacking

Securityaffairs

18.4.19

Researcher Hijacks a Microsoft Service Using Loophole in Azure Cloud Platform

Hacking

Thehackernews

17.4.19

Russian Hackers Scrambled to Erase Digital Footprints After Triton Attribution Report

Hacking

Securityweek

17.4.19

Brazilian Hackers Described as Adaptable Pirates Hacking Securityweek

17.4.19

Blue Cross of Idaho Hacked, Some Member Information Accessed

Hacking

Securityweek

16.4.19

Hackers Access Microsoft Email Services Accounts

Hacking

Securityweek

14.4.19

Hackers Compromise Microsoft Support Agent to Access Outlook Email Accounts

Hacking

Thehackernews

13.4.19

The hacker behind Matrix.org hack offers advice to improve security

Hacking

Securityaffairs

12.4.19

VSDC video editing software website hacked again

Hacking

Securityaffairs

11.4.19

Cars Exposed to Hacker Attacks by Hardcoded Credentials in MyCar Apps

Hacking

Securityweek

10.4.19

Blue + Red: An Infosec Purple Pyramid

Hacking

SANS

10.4.19

Hacking healthcare: A call for infosec researchers to probe biomedical devices

Hacking

Net-security

10.4.19

What hackers inside your company are after: Convenience

Hacking

Net-security

9.4.19

Students Hack High School WiFi to Get Out of Tests

Hacking

Bleepingcomputer

7.4.19

DNS hijacking campaigns target Gmail, Netflix, and PayPal users

Hacking

Securityaffairs

6.4.19

Hackers can add, remove cancer and other illnesses from Computer Tomography scans

Hacking

Securityaffairs

6.4.19

Hackers Can Add, Remove Cancer From CT Scans: Researchers

Hacking

Securityweek

5.4.19

Researchers Hack Google Maps Snake Game to Add God Mode, AI Auto-Play

Hacking

Bleepingcomputer

1.4.19

Investigator Says Amazon Chief's Phone Hacked by Saudis

Hacking

Securityweek

31.3.19

Experts released the List of ~600 MAC addresses hit in ASUS hack

Hacking

Securityaffairs

29.3.19

Georgia Man Admits to Hacking Accounts of Athletes and Musicians

Hacking

Securityweek

29.3.19

Commando VM — Turn Your Windows Computer Into A Hacking Machine

Hacking

Thehackernews

29.3.19

Here's the List of ~600 MAC Addresses Targeted in Recent ASUS Hack

Hacking

Thehackernews

27.3.19

Hackers Are Loving PowerShell, Study Finds

Hacking

Securityweek

27.3.19

ASUS Patches Hijacked System Update Utility

Hacking

Securityweek

26.3.19

Hackers raised fake tornado alarms in two Texas towns

Hacking

Securityaffairs

26.3.19

Attackers compromised ASUS to deliver backdoored software updates

Hacking

Net-security

24.3.19

13-Year-Old Allegedly Hacked Teacher Account to Create Student 'Hit List'

Hacking

Bleepingcomputer

22.3.19

Hacking microcontroller firmware through a USB

Hacking

Securelist

21.3.19

Google Photos Flaw Allowed Hackers to Track Users

Hacking

Securityweek

16.3.19

EPIC Promises to Fix Game Launcher after Privacy Concerns

Hacking

Bleepingcomputer

16.3.19

Students Hack School System to Change Grades and Attendance

Hacking

Bleepingcomputer

16.3.19

Leading Israeli Candidate for PM Targeted by Iranian Hackers

Hacking

Securityweek

16.3.19

Default Account in Cisco CSPC Allows Unauthorized Access

Hacking

Securityweek

15.3.19

Purveyor of Cracked Netflix, Hulu, Spotify Accounts Arrested

Hacking

Threatpost

14.3.19

Beware of Bitcoin Investment Emails Pushing Clipboard Hijackers

Hacking

Bleepingcomputer

9.3.19

Smart Car Alarms Ironically Expose Millions of Vehicles to Remote Hijacking

Hacking

Bleepingcomputer

9.3.19

RSAC 2019: The Dark Side of Machine Learning

Hacking

Threatpost

8.3.19

Man Admits to Hacking Minnesota Databases Over Cop Acquittal

Hacking

Securityweek

7.3.19

Pirate matryoshka

Hacking

Securelist

2.3.19

MageCart Group Evolves Tactics To Better Steal Your Credit Cards

Hacking

Bleepingcomputer

27.2.19

Card-Skimming Scripts Hide Behind Google Analytics, Angular

Hacking

Threatpost

27.2.19

Modern browser APIs can be abused for hijacking device resources

Hacking

Net-security

27.2.19

Increasing security measures are driving cybercriminals to alter their techniques

Hacking

Net-security

26.2.19

How to Attack and Defend a Prosthetic Arm

Hacking

Securelist

25.2.19

Prosecutors Seek 3-Year Sentence in 'Celebgate' Hacking Case

Hacking

Securityweek

23.2.19

Hacking Virtual Reality – Researchers Exploit Popular Bigscreen VR App

Hacking

Thehackernews

20.2.19

Insights on modern adversaries and their tactics, techniques, and procedures

Hacking

Net-security

18.2.19

Toyota PASTA Car-Hacking Tool will be soon on GitHub

Hacking

Securityaffairs

15.2.19

Hackers Target WordPress Sites via WP Cost Estimation Plugin

Hacking

Securityweek

15.2.19

Hacker Breaches Dozens of Sites, Puts 127 Million New Records Up for Sale

Hacking

Thehackernews

14.2.19

Attackers Completely Destroy VFEmail’s Secure Mail Infrastructure

Hacking

Threatpost

13.2.19

Hacker deleted all data from VFEmail Servers, including backups

Hacking

Securityaffairs

13.2.19

Indictment: Hackers Charged With Making Threats to Schools

Hacking

Securityweek

13.2.19

Hackers Destroyed VFEmail Service – Deleted Its Entire Data and Backups

Hacking

Thehackernews

6.2.19

RDP Servers Can Hack Client Devices: Researchers

Hacking

Securityweek

6.2.19

70 real-life hackers and cybersecurity practitioners share their personal insights

Hacking

Net-security

5.2.19

Flaws in Popular RDP Clients Allow Malicious Servers to Reverse Hack PCs

Hacking

Thehackernews

5.2.19

RDP Servers Can Hack Client Devices: Researchers

Hacking

Securityweek

29.1.19

Authorities Seize Hacked Server Marketplace

Hacking

Securityweek

25.1.19

Hackers Using RDP Are Increasingly Using Network Tunneling to Bypass Protections

Hacking

Securityweek

24.1.19

PHP PEAR official site hacked, tainted package manager distributed for 6 months

Hacking

Securityaffairs

23.1.19

Hacker threatened a family using a Nest Camera to broadcast a fake missile attack alert

Hacking Securityaffairs

23.1.19

Hacker Uses Nest Camera to Broadcast Hoax Nuke Alert

Hacking Securityweek

23.1.19

Someone Hacked PHP PEAR Site and Replaced the Official Package Manager

Hacking Thehackernews

23.1.19

Hacker Uses Nest Camera to Broadcast Hoax Nuke Alert

Hacking

Securityweek

23.1.19

Most out of date applications exposed: Shockwave, VLC and Skype top the list

Hacking

Net-security

22.1.19

Ex-Employee Hacks WPML WordPress Plugin Site and Spams Users

Hacking

Bleepingcomputer

21.1.19

Former Employee Hacks Popular WordPress Plugin’s Website

Hacking

Securityweek

18.1.19

Portuguese Hacker Linked to 'Football Leaks' Held in Hungary

Hacking Securityweek

17.1.19

New Magecart Group Targets French Ad Agency

Hacking Securityweek

17.1.19

Hackers infect e-commerce sites by compromising their advertising partner

Hacking

Thehackernews

17.1.19

Fortnite Hacked Via Insecure Single Sign-On

Hacking

Threatpost

17.1.19

Magecart Returns with Advertising Library Tactic

Hacking

Threatpost

17.1.19

Compromised ad company serves Magecart skimming code to hundreds of websites

Hacking

Net-security

16.1.19

Fortnite Flaws Allowed Hackers to Takeover Gamers' Accounts

Hacking Thehackernews

16.1.19

Two Hackers Charged with Hacking SEC System in Stock-Trading Scheme

Hacking Thehackernews

15.1.19

New Variant of BEC Seeks to Divert Payroll Deposits

Hacking

Securityweek

15.1.19

Hack a Tesla Model 3, get cash and the car

Hacking

Net-security

15.1.19

Godaddy Injecting JavaScript That May Break Customer Sites

Hacking

Bleepingcomputer

15.1.19

Hack Allows Escape of Play-with-Docker Containers

Hacking

Threatpost

11.1.19

Hackers Using Zero-Width Spaces to Bypass MS Office 365 Protection

Hacking Thehackernews

7.1.19

unCAPTCHA AI Cracks Google reCAPTCHAs with 90% Accuracy

Hacking

Threatpost

4.1.19

Town of Salem RP Game hacked, more than 7.6M Players affected

Hacking Securityaffairs

3.1.19

Microsoft's Bali Data Bank to Help Users Manage Their Data

Hacking Bleepingcomputer

3.1.19

Website of Dublin Tram System Hacked

Hacking Securityweek

3.1.19

Thousands of Google Chromecast Devices Hijacked to Promote PewDiePie

Hacking Thehackernews

3.1.19

Hackers Hijack Smart TVs to Promote PewDiePie

Hacking Threatpost

3.1.19

Hacker Streaming PewDiePie Videos on Exposed Chromecast DevicesHacking Bleepingcomputer

30.12.18

Shared Tweeting Privileges Easy to Get by Spoofing Phone Numbers

Hacking

Bleepingcomputer

30.12.18

Hackers bypassed vein based authentication with a fake hand

Hacking

Securityaffairs

28.12.18

Guardzilla Home Cameras Open to Anyone Wanting to Watch Their Footage

Hacking

Threatpost

28.12.18

35C3 Day One: Security, Art and Hacking

Hacking

Threatpost

28.12.18

Hijacking Online Accounts Via Hacked Voicemail Systems

Hacking

Threatpost

25.12.18

Orange LiveBox Modems Targeted for SSID and WiFi Info

Hacking Bleepingcomputer
23.12.18 Info on Over 500,000 Students and Staff Exposed in San Diego School District HackHacking Bleepingcomputer

18.12.18

Hackers have become increasingly deft at stealing student data

Hacking

Net-security

17.12.18

PewDiePie Hackers Launch Second Printer Siege, According to Reports

Hacking

Threatpost

15.12.18

Logitech Keystroke Injection Flaw Went Unaddressed for Months

Hacking

Net-security

14.12.18

Logitech Keystroke Injection Flaw Went Unaddressed for Months

Hacking

Net-security

13.12.18

France's Travel Alert Registry HackedHacking Securityweek

11.12.18

Secure Messaging Applications Prone to Session HijackingHacking Securityweek

11.12.18

Highly Active MuddyWater Hackers Hit 30 Organizations in 2 MonthsHacking Securityweek

11.12.18

Linux.org Redirected to NSFW Page Spewing Racial Epithets

Hacking

Threatpost

10.12.18

Expert devised a new WiFi hack that works on WPA/WPA2

Hacking

Securityaffairs

10.12.18

Mitigating the risk of Office 365 account hijacking

Hacking

Net-security

10.12.18 Linux.org Defaced via DNS Hijack Hacking Securityweek
9.12.18STOLEN PENCIL campaign, hackers target academic institutions. Hacking Securityaffairs
9.12.18Pressing F7 in the Command Prompt Lists Previously Entered Commands Hacking Bleepingcomputer
6.12.18Warning! Unprivileged Linux Users With UID > INT_MAX Can Execute Any Command Hacking Thehackernews

6.12.18

Adobe Flash Zero-Day Leveraged Via Office Docs in Campaign

Hacking

Threatpost

4.12.18

YouTuber PewDiePie Promoted Via 50K Hacked Printers

Hacking

Threatpost

3.12.18Hacker hijacks printers worldwide to promote popular YouTube channel Hacking Securityaffairs

1.12.18

Someone Hacked 150,000 Printers to Promote PewDiePie YouTube Channel

Hacking

Thehackernews

27.11.18

Experts demonstrate how to exfiltrate data using smart bulbs

Hacking

Securityaffairs
19.11.18

Stopping the Infiltration of Things

Hacking

Threatpost

19.11.18Million password resets and 2FA codes exposed in unsecured Vovox DBHacking PBWCZ.CZ
19.11.186,500+ sites deleted after Dark Web hosting provider Daniel’s Hosting hackHacking PBWCZ.CZ
18.11.18Many ATMs Can be Hacked in Minutes: ReportHacking PBWCZ.CZ

16.11.18

Gmail Bugs Allow Changing From: Field and Spoofing Recipient's Address

Hacking Bleepingcomputer
15.11.18

Connected Wristwatch Allows Hackers to Stalk, Spy On Children

Hacking

Threatpost

9.11.18689,272 plaintext records of Amex India customers exposed onlineHacking PBWCZ.CZ
8.11.18Evernote Flaw Allows Hackers to Steal Files, Execute CommandsHacking PBWCZ.CZ
8.11.18Hackers Target Telegram, Instagram Users in IranHacking PBWCZ.CZ
7.11.18Hey there! How much are you worth?Hacking PBWCZ.CZ
3.11.18FIFA was hacked again, this is the second hack in a yearHacking PBWCZ.CZ
23.10.18Hackers Deface Website of Saudi Investment ForumHacking PBWCZ.CZ
23.10.18Saudi Future Investment Initiative website defaced by the hackersHacking PBWCZ.CZ
18.10.18After 2016 Hack, Illinois Says Election System SecureHacking PBWCZ.CZ
17.10.18A simple message containing certain symbols could crash the Sony PlayStation 4Hacking PBWCZ.CZ
10.10.18Hackers can compromise your WhatsApp account by tricking you into answering a video callHacking PBWCZ.CZ
8.10.18Expert presented a new attack technique to compromise MikroTik RoutersHacking PBWCZ.CZ
4.10.18Tesco Bank Fined by UK Regulator Over HackingHacking PBWCZ.CZ
24.9.18Hackers Target Real Estate Deals, With Devastating ImpactHacking PBWCZ.CZ
24.9.18Firefox DoS issue crashes the browser and sometimes the Windows OSHacking PBWCZ.CZ
18.9.18Wisconsin Officials Prepare for Potential Election HackersHacking PBWCZ.CZ
18.9.18MageCart Attackers Compromise Cloud Service Firm FeedifyHacking PBWCZ.CZ
18.9.18EOSBet Gambling application hacked, crooks stole $200,000 worth of EOSHacking PBWCZ.CZ
12.9.18Researchers show how to clone Tesla S Key Fobs in a few secondsHacking PBWCZ.CZ
11.9.18Other 3,700 MikroTik Routers compromised in cryptoJacking campaignsHacking PBWCZ.CZ
10.9.18Attackers Made 9,000 Unauthorized Database Queries in Equifax Hack: ReportHacking PBWCZ.CZ
4.9.18Experts warn of 7,500+ MikroTik Routers that are hijacking owners’ trafficHacking PBWCZ.CZ
4.9.18Compromising Proxy Call Session Control Function (P-CSCF) using VoLTEHacking PBWCZ.CZ
4.9.18Parental control spyware app Family Orbit hacked, pictures of hundreds of monitored children were exposedHacking PBWCZ.CZ
4.9.18John McAfee’s Bitfi cryptocurrency wallet was hacked by a security duoHacking PBWCZ.CZ
4.9.18TrendMicro links Urpage hacking crew to other threat actorsHacking PBWCZ.CZ
29.8.18Man Accused of Hacking Into Bank Account, Stealing $300,000Hacking PBWCZ.CZ
28.8.18Google Tells Toomey Hackers Tried to Infiltrate Staff EmailHacking PBWCZ.CZ
24.8.18Intel Simplifies Microcode Update License Following ComplaintsHacking PBWCZ.CZ
22.8.18Dark Tequila AñejoHacking PBWCZ.CZ
21.8.18Anonymous Hackers Target Spain Sites in Catalonia ProtestHacking PBWCZ.CZ
21.8.18Anonymous collective brought down Spain sites to support CataloniaHacking PBWCZ.CZ
16.8.18Hundreds of Instagram accounts were hijacked in a coordinated attackHacking PBWCZ.CZ
15.8.18Foreshadow: New Speculative Execution Flaws Found in Intel CPUsHacking PBWCZ.CZ
14.8.18Key Reuse opens to attacks on IPsec IKE, Cisco, Huawei, ZyXEL products are affectedHacking PBWCZ.CZ
13.8.18 Nigerian Man Found Guilty on Charges Related to HackingHacking PBWCZ.CZ
12.8.18 DNS Hijacking targets Brazilian financial institutionsHacking PBWCZ.CZ
9.8.18Leaked GitHub API Token Exposed Homebrew Software RepositoriesHacking PBWCZ.CZ
8.8.18 BGP Hijacking Attacks Target US Payment ProcessorsHacking PBWCZ.CZ
8.8.18 Hacking WiFi Password in a few steps using a new attack on WPA/WPA2Hacking PBWCZ.CZ
7.8.18New Method Discovered for Cracking WPA2 Wi-Fi PasswordsHacking PBWCZ.CZ
6.8.18Ex-Tesla Worker Accused of Hacking Seeks $1M in CounterclaimHacking PBWCZ.CZ
6.8.18TCM Bank: website misconfiguration exposed applicant data for 16 monthsHacking PBWCZ.CZ
3.8.18Student Charged in Elaborate Digital Money Theft SchemeHacking PBWCZ.CZ
23.7.18Half a Billion Enterprise Devices Exposed by DNS RebindingHacking PBWCZ.CZ
23.7.18 Software Supply Chain Increasingly Targeted in Attacks: SurveyHacking PBWCZ.CZ
19.7.18 Charitable Hackers Collaborate in Deep Web ForumsHacking PBWCZ.CZ
18.7.18Trump Says 'Might' Ask Putin to Extradite Accused Russian HackersHacking PBWCZ.CZ
18.7.18Hacker Offers Access to Machine at International Airport for $10Hacking PBWCZ.CZ
12.7.18German Hosting Firm DomainFactory HackedHacking PBWCZ.CZ
12.7.18Two More Traders Convicted in Newswire Hacking SchemeHacking PBWCZ.CZ
12.7.18 A tainted version of Arch Linux PDF reader package found in a user-provided AURHacking PBWCZ.CZ
12.7.18Do you want penetrate an airport network? An RDP access to internal machine goes for $10 on the dark web.Hacking PBWCZ.CZ
11.7.18HP iLO servers running outdated firmware could be remotely hackedHacking PBWCZ.CZ
11.7.18GoDaddy-owned hosting company Domainfactory hackedHacking PBWCZ.CZ
5.7.18Gentoo Publishes Incident Report After GitHub HackHacking PBWCZ.CZ
26.6.18Misconfigured Java web server component Jolokia expose website at cyber attacksHacking PBWCZ.CZ
24.6.18According to the experts, North Korea is behind the SWIFT attacks in Latin AmericaHacking PBWCZ.CZ
20.6.18Ex-CIA employee Joshua Adam Schulte charged with leaking Vault 7 dumpsHacking PBWCZ.CZ
14.6.18World Cup: US Spy Warns Russians Will Hack Phones, ComputersHacking PBWCZ.CZ
9.6.18Hackers Can Hijack, Sink Ships: ResearchersHacking PBWCZ.CZ
6.6.18 26 Million Users Hit by Ticketfly HackHacking PBWCZ.CZ
2.6.18Visa payments DOWN: Millions affected by a service disruptionHacking PBWCZ.CZ
2.6.18Ticketfly website was compromised, the hacker also stole customers’ dataHacking PBWCZ.CZ
29.5.18The Cobalt Hacking crew is still active even after the arrest of its leaderHacking PBWCZ.CZ
28.5.18Hackers defaced screens at Mashhad airport in Iran protesting the governmentHacking PBWCZ.CZ
27.5.18A bug in T-Mobile site allowed anyone see any customer’s account detailsHacking PBWCZ.CZ
24.5.18Experts warn: it is too easy to steal WiFi access key from TalkTalk ‘s Super RoutersHacking PBWCZ.CZ
20.5.18Misconfigured CalAmp server allowed hacker to take over a lot of vehiclesHacking PBWCZ.CZ
17.5.18 Mexican central bank confirmed that SWIFT hackers stole millions of dollars from Mexican BanksHacking PBWCZ.CZ
16.5.18Hackers Divert Funds From Mexico Banks, Amount Unclear: OfficialHacking PBWCZ.CZ
11.5.18Mining passwords from dozens of public Trello boardsHacking PBWCZ.CZ
11.5.18A Simple Tool Released to Protect Dasan GPON Routers from Remote HackingHacking PBWCZ.CZ
11.5.18 Hackers Found Using A New Way to Bypass Microsoft Office 365 Safe LinksHacking PBWCZ.CZ
11.5.18Tech giant Telstra warns cloud customers they’re at risk of hack due to a SNAFUHacking PBWCZ.CZ
9.5.18Are you using Python module ‘SSH Decorator’? Newer versions include a backdoorHacking PBWCZ.CZ
9.5.18Nintendo Switches Hacked to Run Linux—Unpatchable Exploit ReleasedHacking PBWCZ.CZ
30.4.18PDF Files Can Silently Leak NTLM CredentialsHacking PBWCZ.CZ
28.4.18 How to use weaponized PDF documents to steal Windows credentialsHacking PBWCZ.CZ
27.4.18F-Secure experts devised a Master Key that unlocks millions of hotel roomsHacking PBWCZ.CZ
26.4.18Do Not Disturb app will protect your device from evil maid attacksHacking PBWCZ.CZ
26.4.18Hotel Rooms Around the World Susceptible to Silent BreachHacking PBWCZ.CZ
18.4.18Honeypot Shows the Power of Automation in the Hands of HackersHacking PBWCZ.CZ